Oim Regulatory ResearchWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Oim Regulatory Research returned the following results.
RSS What is RSS?
Related Categories

 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Treasury / Cash / Risk Management
 •   Email Archiving
 •   Storage Management
 •   Enterprise Financial Management Solutions
 •   E-Mail Management
 •   Network Security

Related Searches
 •   All Oim Regulatory
 •   Automated Oim Regulatory
 •   Directory Oim
 •   Oim Business
 •   Oim Regulatory Indian
 •   Oim Regulatory Integration
 •   Oim Regulatory Research Case Study
 •   Oim Supply
 •   Performance Oim Regulatory Research
 •   Resource Oim Regulatory
Advertisement

ALL RESULTS
1 - 25 of 477 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Best Practices in Creating a Strategic Finance Function by SAP America, Inc.

January 23, 2009 - (Free Research)
the following article will share the results of SAP research as well as APQC's Open Standards Benchmarking Collaborative (OSBC) research. The OSBC research is the first global set of common standards for business processes and data, giving organizations an independent, authoritative resource for evaluating and improving business practices. 
(WHITE PAPER) READ ABSTRACT |

Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry by Oracle Corporation

February 23, 2011 - (Free Research)
In this webcast, discover key findings from The Economist Intelligence Unit's new research paper, “Mitigating the Impact of Project Failure in the Financial Services Industry.” 
(WEBCAST) READ ABSTRACT |

EIU Report: Preemptive Action: Mitigating Project Portfolio Risks in the Financial Services Industry by Oracle Corporation

January 31, 2011 - (Free Research)
This research report explains how to ensure long-term viability in the financial services industry by depending on your ability to invest wisely in projects, meet regulatory targets and avoid the costly and public failures that brought down so many other organizations in the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

Countdown to Copenhagen: Government, business and the battle against climate change by SAP AG

July 21, 2009 - (Free Research)
Government, business and the battle against climate change is an EIU report that investigates the current regulatory outlook within key regions of the world. 
(WHITE PAPER) READ ABSTRACT |

The Top 10 Reasons to Automate Your AP Processes by Kofax, Inc.

September 23, 2010 - (Free Research)
This white paper examines in detail the relevant issues and benefits of Accounts Payable (AP) transformation as well as recent industry-wide research and best practices around such initiatives. 
(WHITE PAPER) READ ABSTRACT |

Customer Satisfaction with Email Archiving Systems by Sunbelt Software

January 29, 2010 - (Free Research)
Email archiving is rapidly becoming a critical best practice for organizations of all sizes and across all industries. This white paper compares Sunbelt Exchange Archiver (SEA) with a cross-section of other email archiving offerings, to help decision makers in the evaluation process. 
(WHITE PAPER) READ ABSTRACT |

Making Office 365 More Secure and Compliant by Proofpoint, Inc.

December 19, 2011 - (Free Research)
Microsoft has done a good job at developing a robust and scalable platform in Office 365, but there are some organizations that will need compliance and security capabilities not natively available. View this paper to explore what Office 365 will and will not do and where supplemental offerings from third party vendors will prove to be beneficial. 
(WHITE PAPER) READ ABSTRACT |

Backup in times of virtualization and IT optimization by Hewlett-Packard Company

March 31, 2009 - (Free Research)
Forrester Consulting recently conducted primary customer research to determine how the global economic downturn would affect IT priorities and technology deployments in 2009 and how these changes... 
(WEBCAST) READ ABSTRACT |

2012 Security Outlook by ComputerWeekly.com

February 24, 2012 - (Free Research)
This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Closing the print security gap by ComputerWeekly.com

November 07, 2011 - (Free Research)
This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy. 
(WHITE PAPER) READ ABSTRACT |

Master Data Management Projects in Practice - An Information Difference Research Study by Talend

December 01, 2009 - (Free Research)
Organizations are often turning to Master Data Management as a key enabler in improving the timeliness, quality and reliability of BI with the ultimate goal of improving business performance. This survey report presents recommendations on the "do and don't" of MDM as well as some findings on the use of open source and manual coding in MDM projects. 
(WHITE PAPER) READ ABSTRACT |

A Sustainable Print Agenda by ComputerWeekly.com

May 02, 2014 - (Free Research)
Analysts Louella Fernandes and Clive Longbottom recommend strategies for achieving a cost-effective, reliable and sustainable print infrastructure. 
(ANALYST REPORT) READ ABSTRACT |

Customer Satisfaction with Email Archiving Systems by Sunbelt Software

August 2008 - (Free Research)
Osterman Research surveyed organizations about a variety of email archiving systems to understand overall satisfaction of their current archiving system. The goal is to help decision makers in their archiving evaluation process. 
(WHITE PAPER) READ ABSTRACT |

Content Encryption: Reduce Risk, Liability and Costs by Proofpoint, Inc.

August 2011 - (Free Research)
Download this Osterman Research report on email encryption and other encryption technologies to learn the reasons why sensitive or confidential content must be encrypted both in transit and at rest and why this advice applies to organizations of all sizes, regardless of industry. 
(WHITE PAPER) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Hardening Hadoop for the Enterprise by WANdisco (E-mail this company)

June 2014 - (Free Research)
Prepare for Hadoop implementation with this knowledgeable webcast. 
(WEBCAST) READ ABSTRACT |

Sybase Customer Success: Barclays Capital by Sybase, an SAP company

June 2011 - (Free Research)
Through increased information visibility and data accuracy, Barclays Capital was able to mitigate exposure to operational and reputational risk. Read the entire case study now, compliments of Sybase. 
(CASE STUDY) READ ABSTRACT |

Five Ways to Improve Your Company's Efficiency by Cisco Systems, Inc.

February 2008 - (Free Research)
According to IDC research, 60.2% of SMBs cited improving efficiency as their top business priority in 2005. Read this article to find tips for enhancing efficiency. 
(ARTICLE) READ ABSTRACT |

Long-Term Data Protection and Retention: Finding the Correct Balance by Quantum Corporation

March 2009 - (Free Research)
Tape remains the most cost effective, energy efficient and reliable program technology for storing large amounts of inactive, off-line or near-line data while complimenting disk-based data protection and retention solutions. Read this paper and find out why. 
(WHITE PAPER) READ ABSTRACT |

The GeoTAX ® Enterprise Tax Management solution by Pitney Bowes Group 1 Software

The GeoTAX ® Enterprise Tax Management solution provides you with the necessary tools to centralize all your corporate tax jurisdiction processing needs and supports critical tax compliance issues. 
(SOFTWARE PRODUCT)

Privacy and Big Data by ComputerWeekly.com

August 2013 - (Free Research)
This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

The Renewed Finance Function - Extending Performance Management Beyond Finance by SAP AG

June 2009 - (Free Research)
Companies and their stakeholders have always had high expectations for their finance teams. But this research program reveals that, most recently, these pressures- from regulators, from investors, and from competitors&#$5; are pushing companies to look for more from their finance teams in two main, but often conflicting, areas. 
(CASE STUDY) READ ABSTRACT |

A Guide to Understanding Messaging Archiving by Sunbelt Software

August 2008 - (Free Research)
This analyst paper by Osterman Research discusses the several reasons to implement a messaging archiving system and provide an overview of ten vendors whose offerings are focused squarely on the archiving space. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 477 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts